On 11 Jan 2001, at 11:47, Jim Reid wrote:

> >>>>> "ed" == ed  <[EMAIL PROTECTED]> writes:
> 
>     ed> This issue is important to me because I teach both dns and
>     ed> firewall courses. Normally, I would suggest to students that
>     ed> they block all ports below 1024 (except 53) for packets sent
>     ed> to the dns server. Now, this data makes me wonder if we're
>     ed> turning away good guys or bad guys.
> 
>     ed> What's the official position on resolvers and ephemeral ports?
> 
> I don't think there is one. 
<snip>
> And what if a privileged UNIX application uses a port
> number less than 1024 to query the name server?

This is a compelling argument. You've convinced me. We
simply cannot filter dns packets on the source port.

Thanks,

Ed


Reply via email to